Resources

Excellence Awards 6 Winners, Finalists Show Innovation Up and Down IT Stack

Thu, June 22

Excellence Awards 6 Winners, Finalists Show Innovation Up and Down IT Stack

CATEGORY: VULNERABILITY ASSESSMENT & REMEDIATION

WINNER:Core Security Technologies

Core Impact 5.0

Core Impact 5.0 is a top-notch penetration testing tool that helps IT security teams identify and fully assess an organization's true vulnerability to attacks from within and outside the organization. Core Impact 5.0 probes potential network, system and application weaknesses, allowing a great degree of control over the depths to which its probes go.

The results of Core Impact 5.0 pen tests are thorough and actionable, and they reliably indicate where IT resources should be expended to gain the greatest level of security relative to the business value of the IT devices tested. The product also provides a patent-pending agent that allows administrators to fully explore potential vulnerabilities that usually can be found only when a compromised machine is used as a launch pad for further attacks.

Automating tests and reports is a key function of Core Impact 5.0, allowing companies to significantly improve network security without a corresponding increase in operational costs.

FINALISTS

Juniper NetworksISG 2000 with IDP 1.0

ISG (Integrated Security Gateways) 2000 with IDP (Intrusion Detection and Prevention) 1.0 is a high-performance system that combines multiple security functions on the same hardware platform. Role-based administration allows the product's firewall and VPN functions to be managed apart from the IDP functions, allowing organizations to divvy out rights at a granular level, and the dedicated IDP ASIC (application-specific integrated circuit)-based module provides accelerated processing across the product's operation.

McAfeeFoundstone Enterprise 4.2

Foundstone Enterprise 4.2 is a hardware appliance that has the smarts to discover and map large networks, indicating vulnerabilities and measuring regulatory compliance. The product uses business requirements as indicated by IT managers during configuration to help float the most important vulnerabilities to the top of the remediation list. It also correlates vendor security bulletins with installed IT assets. Using schedules created by the organization, the product automatically scans for weaknesses and alerts IT managers when vulnerabilities are found.